Question 2
What is the primary role of DOJ's Computer Crime and Intellectual Property Section (CCIPS)? A Investigating cybercrime in the field (conducting interviews, executing search warrants) B Prosecuting cybercrime cases, providing policy and legal guidance, and training prosecutors nationwide C Administering CIRCIA breach reporting obligations D Issuing OFAC sanctions designations against ransomware groups
Question 5
Which of the following best describes the FinCEN reporting obligation triggered by a ransomware payment? A All ransomware payments must be reported to FinCEN by the victim within 24 hours B Financial institutions involved in ransomware-related transactions (banks, cryptocurrency exchanges) have BSA Suspicious Activity Report (SAR) filing obligations C FinCEN prohibits all ransomware payments above $10,000 D Only insurance companies paying ransomware claims must report to FinCEN
Question 6
A federal prosecutor needs subscriber information and server logs from an internet company in Germany for a U.S. cybercrime case. What is the formal evidence-sharing mechanism — and what is its primary limitation? A The FBI can directly demand the records under U.S. law; no limitation B A Mutual Legal Assistance Treaty (MLAT) request through DOJ's Office of International Affairs — primary limitation is latency (months to over a year) C CISA can request the records under CIRCIA; limitation is that CIRCIA only covers U.S. critical infrastructure D The Second Additional Protocol to the Budapest Convention requires Germany to produce the records within 24 hours
Question 8
The government seized a portion of the Colonial Pipeline ransom payment. What legal mechanism enables law enforcement to seize cryptocurrency connected to cybercrime? A MLAT with Russia (where the attackers were located) B Criminal forfeiture proceedings — courts can issue seizure warrants for cryptocurrency wallets once identified through blockchain tracing C CFAA civil action seeking restitution from the hacker D FinCEN freeze order on suspicious cryptocurrency accounts
Question 9
The NSA's Vulnerabilities Equities Process (VEP) governs what decision? A Whether to publicly name nation-state hacking groups in DOJ indictments B Whether to disclose a discovered vulnerability to the vendor or retain it for offensive/intelligence use C Whether to extradite foreign hackers to the United States D Whether a vulnerability disclosure by a researcher qualifies for bug bounty payment
Question 10
A company that notified consumers of a breach two months after discovery (without any law enforcement delay request) is facing California AG investigation. A consumer class action was also filed the same week as public notification. What is the most accurate description of the company's legal exposure? A Only the criminal investigation matters — civil class actions cannot proceed until the criminal case is resolved B The company faces both regulatory enforcement (CA AG for breach notification violation) and civil class action exposure (§ 1798.150 for unreasonable security) simultaneously — these run on independent tracks C The company is protected from civil suit because it notified within 60 days, which satisfies the reasonable diligence standard D The CA AG investigation suspends the class action until regulatory proceedings are complete